CN107835167A - A kind of method of data protection, terminal and computer-readable recording medium - Google Patents
A kind of method of data protection, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107835167A CN107835167A CN201711046626.6A CN201711046626A CN107835167A CN 107835167 A CN107835167 A CN 107835167A CN 201711046626 A CN201711046626 A CN 201711046626A CN 107835167 A CN107835167 A CN 107835167A
- Authority
- CN
- China
- Prior art keywords
- packet
- data
- node
- trusted
- peer node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of method of data protection, terminal and computer-readable recording medium, wherein this method includes:Receive the packet that peer node is sent;It is non-trusted node to determine peer node;When packet includes request message, response message corresponding to packet is determined, request message is used for acquisition request feedback data;Feedback data in response message corresponding to packet is replaced with into the first preset data, the response message after being replaced;Response message after replacement is sent to peer node;When packet does not include request message, packet discard, or the data division in packet is replaced with into the second preset data and is stored the packet after replacement;Generate response;Response is sent to peer node, response is used to indicate that packet normally receives.In this way, improving the protective capacities to non-trusted website, strengthen data protection dynamics.
Description
Technical field
The present invention relates to internet security technology, more particularly to a kind of method of data protection, terminal and computer-readable
Storage medium.
Background technology
Firewall technology be one combined by software and hardware equipment, internally between net and extranets, private network
The protective barrier constructed on interface between public network, it is a kind of vivid saying for obtaining security method menu, it is a kind of meter
The combination of calculation machine hardware and software, make to set up a security gateway between network, so as to protect in-house network from disabled user
Intrusion, fire wall is mainly made up of 4 service access rule, verification tool, packet filtering and application gateway parts, and fire wall is just
It is the software or hardware between computer and network that it is connected, the all-network communication of computer inflow and outflow
It is intended to packet by this fire wall.Fire wall can effectively filter out the data that non-trusted website issues, but not be
The data that all non-trusted websites issue can be filtered.Therefore, when non-trusted website will likely be taken under viruliferous data
When being sent to terminal, terminal receive take viruliferous data when, the normal operation of terminal may be influenceed;When non-trusted website
During the data of acquisition request terminal, significant data can be uploaded to non-trusted website by terminal, cause end message to be revealed;In addition,
If terminal is rejected, non-trusted website continuously can send data to terminal, same to influence terminal normal work.
The content of the invention
In order to solve the above technical problems, offer of the embodiment of the present invention a kind of method of data protection, terminal and computer can
Storage medium is read, improves the protective capacities to non-trusted website, strengthens data protection dynamics.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of method of data protection, including:
Receive the packet that peer node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined
For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count
According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data in the packet
Partial replacement is the second preset data, and the packet after replacement is stored;Generate response;The response is sent out
The peer node is delivered to, the response is used to indicate that the packet normally receives.
In such scheme, the response message after the replacement is used to indicate that the peer node stops continuing to send the number
According to bag.
In such scheme, first preset data is:Encryption data, mess code data, full 0 data or complete 1 data;It is described
Encryption data is:The data obtained after the feedback data is encrypted using default AES;Described second is default
Data are:Mess code data, full 0 data or complete 1 data.
In such scheme, after the packet that the reception peer node is sent, methods described also includes:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least
The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine
End node is non-trusted node.
In such scheme, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
A kind of terminal is additionally provided in the embodiment of the present invention, it is characterised in that the terminal includes:Processor and storage
Device;Wherein,
The processor is used to perform the data protection program stored in memory, to realize following steps:Receive opposite end
The packet that node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined
For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count
According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data in the packet
Partial replacement is the second preset data, and the packet after replacement is stored;Response is generated, the response is sent out
The peer node is delivered to, the response is used to indicate that the packet normally receives.
In such scheme, the response message after the replacement is used to indicate that the peer node stops continuing to send the number
According to bag.
In such scheme, after the packet that the reception peer node is sent, the processor is specifically used for realizing
Following steps:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least
The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine
End node is non-trusted node.
In such scheme, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, when the computer program is executed by processor
The step of realizing the method described in any of the above-described.
Method, terminal and the computer-readable recording medium of a kind of data protection provided in an embodiment of the present invention, reception pair
The packet that end node is sent;It is non-trusted node to determine the peer node;When the packet includes request message, really
Response message corresponding to the fixed packet, the request message are used for acquisition request feedback data;The packet is corresponding
Response message in feedback data replace with the first preset data, the response message after being replaced;After the replacement
Response message is sent to the peer node;When the packet does not include request message, the packet is abandoned, or will
Data division in the packet replaces with the second preset data, and the packet after replacement is stored;Response is generated to ring
Should;The response is sent to the peer node, the response is used to indicate that the packet normally receives.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section
After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node
Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with
The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net
The protective capacities stood, strengthen data protection dynamics.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing each optional mobile terminal of embodiment one of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the flow chart of the first embodiment of the method for data protection in the embodiment of the present invention;
Fig. 4 is the flow chart of the second embodiment of the method for data protection in the embodiment of the present invention;
Fig. 5 is the flow chart of the 3rd embodiment of the method for data protection in the embodiment of the present invention;
Fig. 6 is the flow chart of the fourth embodiment of the method for data protection in the embodiment of the present invention;
Fig. 7 is the flow chart of the 5th embodiment of the method for data protection in the embodiment of the present invention;
Fig. 8 is the composition structural representation of terminal in the embodiment of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment
First embodiment of the invention proposes a kind of method of data protection, and this method can apply to data protection
In the terminal of function.
Here, the terminal of above-mentioned record can be the fixed terminal with display screen or the shifting with display screen
Dynamic terminal.
The fixed terminal of above-mentioned record can be computer etc., and the mobile terminal of above-mentioned record includes but is not limited to mobile electricity
Words, notebook computer, camera, PDA, PAD, PMP, guider etc..The terminal can be connected to internet, wherein, institute
The mode for stating connection can be that the mobile internet provided by operator is attached, and can also be and wirelessly connect by access
Access point carries out network connection.
Here, if mobile terminal has operating system, the operating system can be UNIX, Linux, Windows, Android
(Android), Windows Phone etc..
It should be noted that species, shape, size to the display screen in terminal etc. is not limited, it is exemplary, eventually
Display screen on end can be LCDs etc..
In the first embodiment of the invention, the display screen of above-mentioned record is used for the interface for providing a user man-machine interaction.
Fig. 3 is the flow chart of the first embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 3, the party
Method includes:
Step 301:Receive the packet that peer node is sent.
In the embodiment of the present invention, peer node can be able to be specifically with any one network node in computer network
Work station, client, the network user or personal computer, can also be server, printer and other can be set with network connection
It is standby.Each Gong Zuo Zhan ﹑ servers, terminal device, network equipment, that is, the equipment for possessing oneself unique network address is all network
Node.Whole network is made up of this various network node, each network in computer network topologies
It can be connected between node by communication line, form certain geometrical relationship, realize the communication between network node.
In actual applications, network node can be divided into trust network node and non-trusted network node, trust network section
The security of point is higher, and the data for issuing or asking are generally secure data, and what user terminal can trust enters line number therewith
According to interaction;Rather than trusted node is generally in network activity and is possible to dangerous node, such node to user terminal
Threat data is issued, such as:Carry the data of trojan horse;Or user terminal private data is stolen, such as:Privacy information, business
Secret, scientific achievement etc..
Step 302:It is non-trusted node to determine peer node.
When actually implementing, can also include before this step:Obtain the identification information of peer node and non-trusted node
Set, non-trusted node set include the identification information of at least one non-trusted node;When the identification information of peer node is non-
During an identification information in trusted node set, it is non-trusted node to determine peer node.Exemplary, non-trusted node
Identification information includes at least one of following:IP address, domain name.
Another optional embodiment is that non-trusted node set includes at least one non-trusted node type, wherein,
A kind of a kind of corresponding protection rule of non-trusted node type.Terminal it is determined that peer node be non-trusted node after, further really
Recognize the non-trusted node type of peer node, and protection rule, the protection of peer node is completed using the protection rule of determination
Operation.
When actually implementing, the method for building up of non-trusted node set can include:Using network security technology determine to
A few non-trusted node;Non-trusted node set is established using the identification information of all non-trusted nodes of determination;It is non-trusted
The identification information of node can be the domain name or IP address of non-trusted node.
Specifically, the domain name or IP address of peer node are obtained, when the domain name of peer node is in non-trusted node set
A domain name, or peer node IP address be non-trusted node set in an IP address when, determine peer node
For non-trusted node.
Step 303:When packet includes request message, response message corresponding to packet is determined, request message is used for
Acquisition request feedback data;Feedback data in response message corresponding to packet is replaced with into the first preset data, replaced
Response message after changing;Response message after replacement is sent to peer node.
Exemplary, when fire wall can not stop when data request information is transmitted to terminal of non-trusted node, terminal
When receiving the request message that non-trusted node is sent, can be determined according to normal request responding process comprising feedback data
Response message, using the response message comprising feedback data as the first response message;Response message is being sent to non-trusted node
Before, the feedback data in the first response message is replaced with into the first preset data, obtains the second response message, terminal finally will
Second response message is sent to peer node.
Exemplary, the first preset data is:Encryption data, mess code data, full 0 data or complete 1 data, encryption data
For:The data obtained after feedback data is encrypted using default AES.It is understood that the first response message
In the feedback data that includes be valid data, the first preset data included in the second response message obtained after replacement is
Invalid data.Non-trusted node will be considered that when receiving the second response message of terminal transmission has normally stolen number of terminals
According to the request of data to the terminal will be stopped.
Exemplary, default AES can be:IDEA(International Data Encryption
Algorithm, Chinese IDEA), DES (Data Encryption Standard, Chinese data
Encryption standard), MD5 (Message-Digest Algorithm 5, Chinese Message-Digest Algorithm 5) etc..
It should be noted that when non-trusted node detects to the response message received, because encryption data does not have
There is any detection foundation, therefore be easier to believe non-trusted server successfully to steal terminal data, and stop to the end
The request of data at end.
In the embodiment of the present invention, the response message after replacement is used to indicate that peer node stops continuing to send packet.
Step 304:When packet does not include request message, packet discard, or by the data division in packet
The second preset data is replaced with, the packet after replacement is stored;Generate response;Response is sent to opposite end
Node, response are used to indicate that packet normally receives.
In the embodiment of the present invention, packet does not refer to that the packet issues for non-trusted node to terminal including request message
Data, rather than data for acquisition request terminal.Packet includes:Head and data division, wherein, data division can
Can take viruliferous threat data, terminal receives and may threaten terminal security after data storage bag.
Exemplary, when fire wall can not stop the packet issued of non-trusted node, terminal is receiving non-letter
During the packet for appointing node to send, directly by data packet discarding;Or the data division in packet is replaced with second and preset
Data, the packet after replacement is stored.Exemplary, the second preset data is:Mess code data, full 0 data or complete 1 number
According to.
Generate response;Response is sent to peer node;The response is used to indicate the packet just
Often receive.
In the embodiment of the present invention, response is sent to peer node, to inform data that peer node this time issues
Bag has been received normally, and avoids peer node from persistently issuing packet.
When actually implementing, the packet after storage is replaced can also include afterwards:It will be replaced after default time interval
Packet after changing is deleted.When actually implementing, if terminal directly can be by non-trusted node by the operation of data packet discarding
Detect, and carry out packet and resend;In order to avoid such case occurs, first the data content in packet can be replaced
The first preset data is changed to, then the packet after replacement is stored.Here the packet after replacing eliminates threat data,
The storage of terminal will not threaten the safety of terminal.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section
After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node
Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with
The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net
The protective capacities stood, strengthen data protection dynamics.
In order to more embody the purpose of the present invention, on the basis of first embodiment of the invention, such scheme is carried out
It is further to illustrate.
Second embodiment
Fig. 4 is the flow chart of the second embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 4, the stream
Journey includes:
Step 401:Receive the data request information that peer node is sent.
In the embodiment of the present invention, peer node can also be base station, and mobile terminal receives the request of data that base station is sent and disappeared
Breath.The request message can be used for acquisition request mobile terminal data, such as:Address list, privacy of user, the data of application program
Deng.
Step 402:Obtain the identification information of peer node.
Step 403:Whether the identification information for judging peer node is identification information in non-trusted node set;If
It is to perform step 404;If not, perform step 407.
Step 404:It is non-trusted node to determine peer node, and determines response message corresponding to request message.
Step 405:Feedback data in response message is replaced with into the first preset data, the response after being replaced disappears
Breath.
Exemplary, response message includes corresponding to request message:Statusline, message header, physical contents, wherein, entity
Content is the feedback data of terminal.Physical contents are replaced with into the response message after being replaced after the first preset data.
Another optional embodiment is that non-trusted node set includes at least one non-trusted node type, wherein,
A kind of a kind of corresponding protection rule of non-trusted node type.Terminal it is determined that peer node be non-trusted node after, further really
Recognize the non-trusted node type of peer node, and protection rule, the protection of peer node is completed using the protection rule of determination
Operation.Exemplary, different corresponding the first different preset data of protection rule, for example, the non-trusted node of the first kind is corresponding
Protection rule be:Feedback data is replaced with into encryption data, protection rule is corresponding to the non-trusted node of the second class:Will feedback
Data replace with mess code data, and protection rule is corresponding to the 3rd non-trusted node of class:Feedback data is replaced with into full 0 data,
Protection rule is corresponding to the 4th non-trusted node of class:Feedback data is replaced with into complete 1 data.
Step 406:Response message after replacement is sent to peer node.
When actually implementing, physical contents of the peer node in message is read after receiving response message, confirm to complete
This request of data flow, stop sending data request information to terminal.
Step 407:It is trusted node to determine peer node, and determines response message corresponding to request message.
Step 408:Response message corresponding to request message is sent to peer node.
Here, after it is determined that peer node is trusted node, i.e., peer node be security node, performs normal request sound
Flow is answered, that is, performs step 407 and step 408.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention
Explanation.
3rd embodiment
Fig. 5 is the flow chart of the 3rd embodiment of the method for data protection in the embodiment of the present invention, as shown in figure 5, the stream
Journey includes:
Step 501:Receive the packet that peer node is sent.
Here, packet is the data that peer node issues to terminal, and terminal only needs to receive, it is not necessary to on peer node
Pass its data.
Step 502:Obtain the identification information of peer node.
Step 503:Whether the identification information for judging peer node is identification information in non-trusted node set;If
It is to perform step 504;If not, perform step 506.
Step 504:It is non-trusted node to determine peer node, and packet discard simultaneously generates " confirming to receive " response.
When actually implementing, when peer node is non-trusted node, the packet that terminal receives may carry virus, because
This is needed data packet discarding.
When actually implementing, non-trusted node set is established by existing Network Security Device.Network Security Device
Also non-trusted node can be classified, Network Security Device is implemented different protection to different types of non-trusted node and advised
Then.For example, the first non-trusted node correspondingly protects regular A, second of non-trusted node correspondingly protects regular B.Therefore, terminal
When it is determined that peer node is non-trusted node, the non-trusted node type of peer node can also be further determined that, according to non-
Trusted node type protects rule corresponding to determining.
Step 505:" it will confirm to receive " response to send to peer node.
Step 506:Received data packet.
Here, received data packet concrete implementation mode is terminal data method of reseptance of the prior art, here no longer
Repeat.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention
Explanation.
Fourth embodiment
Fig. 6 is the flow chart of the fourth embodiment of the method for data protection in the embodiment of the present invention, as shown in fig. 6, the stream
Journey includes:
Step 601:Receive the packet that peer node is sent.
Step 602:Obtain the identification information of peer node.
Step 603:Whether the identification information for judging peer node is identification information in non-trusted node set;If
It is to perform step 604;If not, perform step 607.
Step 604:Data division in packet is replaced with into the second preset data, the packet after replacement is deposited
Storage, and generate " confirming to receive " response.
When actually implementing, for terminal after packet is received, non-trusted node may be within a certain period of time to terminal
It is monitored, when non-trusted nodal test is to terminal not received data bag, can be resend.In order to avoid this feelings
Data division in packet first can be replaced with the second preset data and be stored again, so reached " deception " by condition, terminal
Purpose.
Specifically, the packet received includes:Head and data division, retain header contents, data division is replaced
To be stored after full 0 data.
Step 605:" it will confirm to receive " response to send to peer node.
Step 606:The packet after replacement is deleted after default time interval.
In this step, determine this packet to issue when operation is completed in non-trusted node and delete the packet of storage.
Step 607:Received data packet.
In order to more embody the purpose of the present invention, further illustrated on the basis of first embodiment of the invention
Explanation.
5th embodiment
Fig. 7 is the flow chart of the 5th embodiment of the method for data protection in the embodiment of the present invention, in the embodiment of the present invention
Peer node is specifically described by taking server as an example, as shown in fig. 7, the flow includes:
Step 701:Pre-establish non-trusted node set.
When actually implementing, at least one non-trusted node is determined by existing Network Security Device;Utilize determination
The identification information of all non-trusted nodes establishes non-trusted node set;The identification information of non-trusted node can be non-trusted section
The domain name or IP address of point.
Step 702:The packet that the reception server is sent.
Step 703:Obtain the domain name and IP address of server.
Step 704:Whether the domain name or IP address for judging server belong to non-trusted node set, if it is, performing step
Rapid 705;If not, perform step 709.
When actually implementing, all non-trusted nodes that can determine that are identified by existing network safety prevention means,
Non-trusted node set is established using all identified non-trusted nodes.
Judge the domain name of server or whether IP address belongs to the method for non-trusted node set and can include:By server
Domain name or IP address send to perform data safety protection equipment, the equipment is according to the domain name or IP address that receive and guarantor
The non-trusted node set deposited is compared, and determines whether the domain name of server or IP address belong to non-trusted node set, and
Generate configured information;Configured information is sent to terminal, terminal and determines whether that for server be non-trusted clothes according to configured information
Business device.
Or terminal by the domain name of server or IP address compared with the non-trusted node set preserved in advance, really
Determine whether server is non-trusted server.
Step 705:It is non-trusted server to determine server.
Step 706:Whether include request message in the packet for judging to receive;If it is, perform step 707;If
It is no, perform step 708.
When actually implementing, the method for judging whether to include request message in packet can be:By detecting packet
In whether include the identification information of request message, to determine whether include request message in packet.Here, due to existing logical
Letter agreement has determined have the definition clearly arrived to the form for transmitting data, and different types of data correspond to different data formats,
Therefore, the identification information of request message can be the data format of request message.
Step 707:Response message corresponding to request message is determined, it is pre- that the feedback data in response message is replaced with into first
If data, the response message after being replaced;Response message after replacement is sent to server.
It is exemplary, the feedback data in response message is replaced with into mess code data, or by the feedback in response message
Data replace with encryption data.
Here, encryption data can be:The data obtained after feedback data is encrypted using default AES.
Exemplary, can be by response message when the user privacy information of non-trusted server acquisition request terminal
Privacy information be encrypted, the response after generation after correct privacy information is replaced is replaced with the privacy information after encryption and is disappeared
Breath, then the response message after replacement is sent to non-trusted server.
It should be noted that when non-trusted node detects to the response message received, because encryption data does not have
There is any detection successfully to steal terminal data according to being easier to believe non-trusted server, and stop the number to the terminal
According to request.
Step 708:Packet discard simultaneously generates " confirming to receive " response;By " confirming to receive " response of generation
Send to server.
In the embodiment of the present invention, " confirming to receive " response is used to indicate the packet that non-trusted server this time issues
It has been be received normally that, avoid non-trusted server from persistently issuing packet.
Step 709:It is trusted node to determine server, and received data packet simultaneously performs corresponding processing operation.
In this step, normal data reception operation is performed when terminal determines that server is trusted node.
Method, terminal and the computer-readable recording medium of a kind of data protection provided in an embodiment of the present invention, reception pair
The packet that end node is sent;It is non-trusted node to determine the peer node;When the packet includes request message, really
Response message corresponding to the fixed packet, the request message are used for acquisition request feedback data;The packet is corresponding
Response message in feedback data replace with the first preset data, the response message after being replaced;After the replacement
Response message is sent to the peer node;When the packet does not include request message, the packet is abandoned, or will
Data division in the packet replaces with the second preset data and is stored the packet after replacement;Response is generated to ring
Should;The response is sent to the peer node, the response is used to indicate that the packet normally receives.
Using above-mentioned technical proposal, when it is determined that the peer node for sending packet is non-trusted node, by non-trusted section
After the feedback data of point request replaces with the first preset data, sending to peer node;Or the number for sending peer node
Directly abandon, and returned for indicating the response that normally receives according to bag, that is, avoid non-trusted node data steal with
The threat data of non-trusted node is received, non-trusted node is it also avoid and continuously transmits packet.In this way, improve to non-trusted net
The protective capacities stood, strengthen data protection dynamics.
Sixth embodiment
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of terminal.Fig. 8 is terminal in the embodiment of the present invention
Composition structural representation, as shown in figure 8, the terminal 80 includes:Processor 801 and memory 802, wherein,
The processor 801 is used to perform the data protection program stored in memory, to realize following steps:Reception pair
The packet that end node is sent;
It is non-trusted node to determine the peer node;
When the packet includes request message, response message corresponding to the packet, the request message are determined
For acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first present count
According to the response message after being replaced;Response message after the replacement is sent to the peer node;
When the packet does not include request message, the packet is abandoned, or by the data division in packet
Replace with the second preset data and stored the packet after replacement;Generate response;And the response is sent out
The peer node is delivered to, the response is used to indicate that the packet normally receives.
When actually implementing, the response message after the replacement is used to indicate that the peer node stops continuing described in transmission
Packet.
First preset data is:Encryption data, mess code data, full 0 data or complete 1 data;The encryption data is:
The data obtained after the feedback data is encrypted using default AES;Second preset data is:Mess code
Data, full 0 data or complete 1 data.
When actually implementing, after the packet that the reception peer node is sent, the processor 801 is specifically used for
Realize following steps:
The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set is included at least
The identification information of one non-trusted node;
When the identification information of the peer node is an identification information in non-trusted node set, it is described right to determine
End node is non-trusted node.
When actually implementing, the method for building up of non-trusted node set can include:By network security technology determine to
A few non-trusted node;Non-trusted node set is established using the identification information of all non-trusted nodes of determination.
When actually implementing, the identification information of the non-trusted node is including at least one of following:IP address, domain name.
When actually implementing, terminal 80 can be the mobile terminal 100 shown in Fig. 1, and processor 801 can be mobile terminal
Processor 110 in 100, memory 802 can be the memory 109 in mobile terminal 100.
In actual applications, above-mentioned processor 801 can be application-specific IC (ASIC, Application
Specific Integrated Circuit), digital signal processing device (DSPD, Digital Signal Processing
Device), programmable logic device (PLD, Programmable Logic Device), field programmable gate array
At least one of (Field-Programmable Gate Array, FPGA), controller, microcontroller, microprocessor.Can
To understand ground, for different equipment, for realizing that the electronic device of above-mentioned processor function can also be other, the present invention is real
Example is applied to be not especially limited.
Above-mentioned memory 802 can be volatile memory (volatile memory), such as random access memory
(RAM, Random-Access Memory);Or nonvolatile memory (non-volatile memory), such as read-only deposit
Reservoir (ROM, Read-Only Memory), flash memory (flash memory), hard disk (HDD, Hard Disk Drive)
Or solid state hard disc (SSD, Solid-State Drive);Or the combination of the memory of mentioned kind, and carried to processor 801
For instruction and data.
In addition, each functional module in the present embodiment can be integrated in a processing unit or each list
Member be individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated unit both can be with
Realized, can also be realized in the form of software function module in the form of hardware.
If the integrated unit realizes that being not intended as independent product is sold in the form of software function module
Or in use, it can be stored in a computer read/write memory medium, based on such understanding, the technical side of the present embodiment
The part or all or part of the technical scheme that case substantially contributes to prior art in other words can be produced with software
The form of product is embodied, and the computer software product is stored in a storage medium, including some instructions are causing one
Platform computer equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform sheet
The all or part of step of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage
(ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD
Etc. it is various can be with the medium of store program codes.
7th embodiment
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, such as including
The memory of computer program, above computer program can be foregoing one or more to complete by the computing device of terminal
Method and step in individual embodiment.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
- A kind of 1. method of data protection, it is characterised in that methods described includes:Receive the packet that peer node is sent;It is non-trusted node to determine the peer node;When the packet includes request message, response message corresponding to the packet is determined, the request message is used for Acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first preset data, obtained Response message after to replacement;Response message after the replacement is sent to the peer node;When the packet does not include request message, the packet is abandoned, or by the data division in the packet Replace with the second preset data and stored the packet after the replacement;Generate response;By the response Send to the peer node, the response is used to indicate that the packet normally receives.
- 2. according to the method for claim 1, it is characterised in that the response message after the replacement is used to indicate the opposite end Node stops continuing to send the packet.
- 3. according to the method for claim 1, it is characterised in that first preset data is:Encryption data, mess code number According to, full 0 data or complete 1 data;The encryption data is:After the feedback data is encrypted using default AES Obtained data;Second preset data is:Mess code data, full 0 data or complete 1 data.
- 4. according to the method for claim 1, it is characterised in that after the packet that the reception peer node is sent, Methods described also includes:The identification information of non-trusted node set and the peer node is obtained, the non-trusted node set includes at least one The identification information of non-trusted node;When the identification information of the peer node is an identification information in non-trusted node set, determine described to end segment Point is non-trusted node.
- 5. according to the method for claim 4, it is characterised in that the identification information of the non-trusted node include it is following at least One:IP address, domain name.
- 6. a kind of terminal, it is characterised in that the terminal includes:Processor and memory;Wherein,The processor is used to perform the data protection program stored in memory, to realize following steps:Receive peer node The packet of transmission;It is non-trusted node to determine the peer node;When the packet includes request message, response message corresponding to the packet is determined, the request message is used for Acquisition request feedback data;Feedback data in response message corresponding to the packet is replaced with into the first preset data, obtained Response message after to replacement;Response message after the replacement is sent to the peer node;When the packet does not include request message, the packet is abandoned, or by the data division in the packet Replace with the second preset data and stored the packet after the replacement;Generate response;By the response Send to the peer node, the response is used to indicate that the packet normally receives.
- 7. terminal according to claim 6, it is characterised in that the response message after the replacement is used to indicate the opposite end Node stops continuing to send the packet.
- 8. terminal according to claim 6, it is characterised in that after the packet that the reception peer node is sent, The processor is specifically used for realizing following steps:The identification information of the peer node and non-trusted node set are obtained, the non-trusted node set includes at least one The identification information of non-trusted node;When the identification information of the peer node is an identification information in non-trusted node set, determine described to end segment Point is non-trusted node.
- 9. terminal according to claim 8, it is characterised in that the identification information of the non-trusted node include it is following at least One:IP address, domain name.
- 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program quilt The step of method described in any one of claim 1 to 5 is realized during computing device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711046626.6A CN107835167A (en) | 2017-10-31 | 2017-10-31 | A kind of method of data protection, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711046626.6A CN107835167A (en) | 2017-10-31 | 2017-10-31 | A kind of method of data protection, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107835167A true CN107835167A (en) | 2018-03-23 |
Family
ID=61651056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711046626.6A Pending CN107835167A (en) | 2017-10-31 | 2017-10-31 | A kind of method of data protection, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107835167A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266582A (en) * | 2019-05-29 | 2019-09-20 | 深圳市梦网科技发展有限公司 | A kind of information push method, system, server and communication terminal |
CN110661762A (en) * | 2018-06-29 | 2020-01-07 | 中兴通讯股份有限公司 | Cross information transmission method, device and computer storage medium |
CN110662248A (en) * | 2018-06-29 | 2020-01-07 | 成都鼎桥通信技术有限公司 | Signal measurement method and apparatus |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790982A (en) * | 2005-12-26 | 2006-06-21 | 北京航空航天大学 | Method and system for realizing trust identification based on negotiation communication |
CN102164033A (en) * | 2010-02-24 | 2011-08-24 | 腾讯科技(深圳)有限公司 | Method, device and system for preventing services from being attacked |
CN104519043A (en) * | 2013-09-30 | 2015-04-15 | 瞻博网络公司 | Fuzzing server responses to malicious client devices |
CN104618404A (en) * | 2015-03-10 | 2015-05-13 | 网神信息技术(北京)股份有限公司 | Processing method, device and system for preventing network attack to Web server |
CN104899175A (en) * | 2014-03-04 | 2015-09-09 | 深圳市中兴微电子技术有限公司 | Safety access control method and device based on on-chip bus protocol |
US20160224985A1 (en) * | 2015-01-30 | 2016-08-04 | Kounosoft Co., Ltd. | System and method for card payment in which confirmation is available before transaction |
CN106709280A (en) * | 2016-12-08 | 2017-05-24 | 北京旷视科技有限公司 | Method, client and server for processing information |
-
2017
- 2017-10-31 CN CN201711046626.6A patent/CN107835167A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790982A (en) * | 2005-12-26 | 2006-06-21 | 北京航空航天大学 | Method and system for realizing trust identification based on negotiation communication |
CN102164033A (en) * | 2010-02-24 | 2011-08-24 | 腾讯科技(深圳)有限公司 | Method, device and system for preventing services from being attacked |
CN104519043A (en) * | 2013-09-30 | 2015-04-15 | 瞻博网络公司 | Fuzzing server responses to malicious client devices |
CN104899175A (en) * | 2014-03-04 | 2015-09-09 | 深圳市中兴微电子技术有限公司 | Safety access control method and device based on on-chip bus protocol |
US20160224985A1 (en) * | 2015-01-30 | 2016-08-04 | Kounosoft Co., Ltd. | System and method for card payment in which confirmation is available before transaction |
CN104618404A (en) * | 2015-03-10 | 2015-05-13 | 网神信息技术(北京)股份有限公司 | Processing method, device and system for preventing network attack to Web server |
CN106709280A (en) * | 2016-12-08 | 2017-05-24 | 北京旷视科技有限公司 | Method, client and server for processing information |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661762A (en) * | 2018-06-29 | 2020-01-07 | 中兴通讯股份有限公司 | Cross information transmission method, device and computer storage medium |
CN110662248A (en) * | 2018-06-29 | 2020-01-07 | 成都鼎桥通信技术有限公司 | Signal measurement method and apparatus |
CN110661762B (en) * | 2018-06-29 | 2022-04-15 | 中兴通讯股份有限公司 | Cross information transmission method, device and computer storage medium |
CN110662248B (en) * | 2018-06-29 | 2022-07-08 | 成都鼎桥通信技术有限公司 | Signal measurement method and apparatus |
CN110266582A (en) * | 2019-05-29 | 2019-09-20 | 深圳市梦网科技发展有限公司 | A kind of information push method, system, server and communication terminal |
CN110266582B (en) * | 2019-05-29 | 2022-08-26 | 深圳市梦网科技发展有限公司 | Message pushing method, system, server and communication terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107562336A (en) | A kind of method, equipment and computer-readable recording medium for controlling suspension ball | |
CN107729133A (en) | A kind of method, terminal and computer-readable recording medium for running application program | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107295501A (en) | Information updating method, terminal, server and computer-readable recording medium | |
CN107517321A (en) | Terminal pattern switching method, mobile terminal and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN108075899A (en) | A kind of auth method, mobile terminal and computer readable storage medium | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN107517208A (en) | Apparatus control method, device and computer-readable recording medium | |
CN107181865A (en) | Processing method, terminal and the computer-readable recording medium of unread short messages | |
CN107563158A (en) | Show hiden application figure calibration method, equipment and computer-readable recording medium | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN107621915A (en) | A kind of message prompt method, equipment and computer-readable storage medium | |
CN107635232A (en) | A kind of network share method, terminal and computer-readable recording medium | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN107835167A (en) | A kind of method of data protection, terminal and computer-readable recording medium | |
CN107622213A (en) | A kind of data access method, terminal and computer-readable recording medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN107562343A (en) | A kind of interactive regulation and control method, equipment and computer-readable recording medium | |
CN107423065A (en) | Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else | |
CN107516051A (en) | A kind of data encryption storage method, device and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180323 |